Add the vulnerabilities database to the site; but don't link it in
authorMark J. Cox <mark@openssl.org>
Tue, 31 May 2005 21:42:48 +0000 (21:42 +0000)
committerMark J. Cox <mark@openssl.org>
Tue, 31 May 2005 21:42:48 +0000 (21:42 +0000)
yet until it's working totally.  To change or add a vulnerability you
exit vulnerabilities.xml then run an xslt processor on that file with
the vulnerabilities.xsl stylesheet and out will pop vulnerabilities.wml
that the website knows how to process.  For now we make the user who
commits the change do this, and also commit in the wml file.  We could
probably do this at make time with some perl, but the openssl site
doesn't have all the dependancies needed for XML::XSLT yet.

Although a lot of this information is in our changes file and in news
items on the site there isn't a single place where you can get a
complete overview of the vulnerabilities.  A CSO I was speaking too
this month was suprised by how few issues there had been and thought
there were many more serious issues that had affected OpenSSL, this
page is, unsuprisingly, similar to the Apache httpd vulnerabilities pages
and is based on raw data I've been collecting on vulnerabilities for
Red Hat.

news/vulnerabilities.wml [new file with mode: 0644]
news/vulnerabilities.xml [new file with mode: 0644]
news/vulnerabilities.xsl [new file with mode: 0644]
news/vulnerabilitiesdates.xsl [new file with mode: 0644]

diff --git a/news/vulnerabilities.wml b/news/vulnerabilities.wml
new file mode 100644 (file)
index 0000000..8e0bb59
--- /dev/null
@@ -0,0 +1,242 @@
+## Do not edit this file, instead edit vulnerabilities.xml
+## then create it using
+## xsltproc vulnerabilities.xsl vulnerabilities.xml 
+##
+
+#use wml::openssl area=news pages=vulnerabilities
+
+
+<title>OpenSSL vulnerabilities</title>
+<h1>OpenSSL vulnerabilities</h1>
+<p>This page lists all security vulnerabilities fixed in released
+versions of OpenSSL since 0.9.6 was released on 24th September 2000.
+</p>
+<h2>2004</h2>
+<dl>
+  <dt><b><a name="2004-0975"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0975">CAN-2004-0975</a></a></b>: 30th September 2004<p/></dt>
+  <dd>
+    <description>
+The der_chop script created temporary files insecurely which could
+allow local users to overwrite files via a symlink attack on temporary
+files.  Note that it is quite unlikely that a user would be using the
+redundant der_chop script, and this script was removed from the OpenSSL
+distribution.
+    </description>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7f (Affected 0.9.7e, 0.9.7d, 0.9.7c, 0.9.7b, 0.9.7a, 0.9.7) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.6-cvs (Affected 0.9.6m, 0.9.6l, 0.9.6k, 0.9.6j, 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+  <dt><b><a name="2004-0112"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0112">CAN-2004-0112</a></a></b>: 17th March 2004<p/></dt>
+  <dd>
+    <description>
+A flaw in SSL/TLS handshaking code when using Kerberos ciphersuites.
+A remote attacker could perform a carefully crafted SSL/TLS handshake
+against a server configured to use Kerberos ciphersuites in such a way
+as to cause OpenSSL to crash.  Most applications have no ability to
+use Kerberos ciphersuites and will therefore be unaffected.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030317.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7d (Affected 0.9.7c, 0.9.7b, 0.9.7a) </dd>
+  <p/>
+  <dt><b><a name="2004-0081"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0081">CAN-2004-0081</a></a></b>: 17th March 2004<p/></dt>
+  <dd>
+    <description>
+The Codenomicon TLS Test Tool found that some unknown message types
+were handled incorrectly, allowing a remote attacker to cause a denial
+of service (infinite loop).
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030317.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <p/>
+  <dt><b><a name="2004-0079"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0079">CAN-2004-0079</a></a></b>: 17th March 2004<p/></dt>
+  <dd>
+    <description> 
+The Codenomicon TLS Test Tool uncovered a null-pointer assignment in the
+do_change_cipher_spec() function.  A remote attacker could perform a
+carefully crafted SSL/TLS handshake against a server that used the
+OpenSSL library in such a way as to cause a crash.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030317.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7d (Affected 0.9.7c, 0.9.7b, 0.9.7a, 0.9.7) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.6m (Affected 0.9.6l, 0.9.6k, 0.9.6j, 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c) </dd>
+  <p/>
+</dl>
+<h2>2003</h2>
+<dl>
+  <dt><b><a name="2003-0851"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0851">CAN-2003-0851</a></a></b>: 4th November 2003<p/></dt>
+  <dd>
+    <description> 
+A flaw in OpenSSL 0.9.6k (only) would cause certain ASN.1 sequences to
+trigger a large recursion.  On platforms such as Windows this large
+recursion cannot be handled correctly and so the bug causes OpenSSL to
+crash.  A remote attacker could exploit this flaw if they can send
+arbitrary ASN.1 sequences which would cause OpenSSL to crash.  This
+could be performed for example by sending a client certificate to a
+SSL/TLS enabled server which is configured to accept them.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20031104.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6l (Affected 0.9.6k) </dd>
+  <p/>
+  <dt><b><a name="2003-0545"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0545">CAN-2003-0545</a></a></b>: 30th September 2003<p/></dt>
+  <dd>
+    <description>
+Certain ASN.1 encodings that were rejected as invalid by the parser could
+trigger a bug in the deallocation of the corresponding data structure,
+corrupting the stack, leading to a crash.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030930.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7c (Affected 0.9.7b, 0.9.7a, 0.9.7) </dd>
+  <p/>
+  <dt><b><a name="2003-0544"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0544">CAN-2003-0544</a></a></b>: 30th September 2003<p/></dt>
+  <dd>
+    <description>
+Incorrect tracking of the number of characters in certain
+ASN.1 inputs could allow remote attackers to cause a denial of
+service (crash) by sending an SSL client certificate that causes OpenSSL to
+read past the end of a buffer when the long form is used.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030930.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6k (Affected 0.9.6j, 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.7c (Affected 0.9.7b, 0.9.7a, 0.9.7) </dd>
+  <p/>
+  <dt><b><a name="2003-0543"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0543">CAN-2003-0543</a></a></b>: 30th September 2003<p/></dt>
+  <dd>
+    <description>
+An integer overflow could allow remote attackers to cause a denial of
+service (crash) via an SSL client certificate with certain ASN.1 tag
+values.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030930.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7c (Affected 0.9.7b, 0.9.7a, 0.9.7) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.6k (Affected 0.9.6j, 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+  <dt><b><a name="2003-0147"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0147">CAN-2003-0147</a></a></b>: 14th March 2003<p/></dt>
+  <dd>
+    <description>
+RSA blinding was not enabled by default, which could allow local and
+remote attackers to obtain a server's private key by determining
+factors using timing differences on (1) the number of extra reductions
+during Montgomery reduction, and (2) the use of different integer
+multiplication algorithms (&quot;Karatsuba&quot; and normal).
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030317.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7b (Affected 0.9.7a, 0.9.7) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.6j (Affected 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+  <dt><b><a name="2003-0131"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0131">CAN-2003-0131</a></a></b>: 19th March 2003<p/></dt>
+  <dd>
+    <description>
+The SSL and TLS components allowed remote attackers to perform an
+unauthorized RSA private key operation via a modified Bleichenbacher
+attack that uses a large number of SSL or TLS connections using PKCS #1 
+v1.5 padding that caused OpenSSL to leak information regarding the
+relationship between ciphertext and the associated plaintext, aka the
+&quot;Klima-Pokorny-Rosa attack&quot;
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030319.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6j (Affected 0.9.6i, 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.7b (Affected 0.9.7a, 0.9.7) </dd>
+  <p/>
+  <dt><b><a name="2003-0078"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0078">CAN-2003-0078</a></a></b>: 19th February 2003<p/></dt>
+  <dd>
+    <description>
+sl3_get_record in s3_pkt.c did not perform a MAC computation if an
+incorrect block cipher padding was used, causing an information leak
+(timing discrepancy) that may make it easier to launch cryptographic
+attacks that rely on distinguishing between padding and MAC
+verification errors, possibly leading to extraction of the original
+plaintext, aka the &quot;Vaudenay timing attack.&quot;
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20030219.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.7a (Affected 0.9.7) </dd>
+  <dd>Fixed in OpenSSL  
+      0.9.6i (Affected 0.9.6h, 0.9.6g, 0.9.6f, 0.9.6e, 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+</dl>
+<h2>2002</h2>
+<dl>
+  <dt><b><a name="2002-0659"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0659">CAN-2002-0659</a></a></b>: 30th July 2002<p/></dt>
+  <dd>
+    <description>
+A flaw in the ASN1 library allowed remote attackers to cause a denial of 
+service by sending invalid encodings.
+    </description>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6e (Affected 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a) </dd>
+  <p/>
+  <dt><b><a name="2002-0657"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0657">CAN-2002-0657</a></a></b>: 30th July 2002<p/></dt>
+  <dd>
+    <description>
+A buffer overflow when Kerberos is enabled allowed attackers
+to execute arbitrary code by sending a long master key.  Note that this
+flaw did not affect any released version of 0.9.6 or 0.9.7
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20020730.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <p/>
+  <dt><b><a name="2002-0656"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0656">CAN-2002-0656</a></a></b>: 30th July 2002<p/></dt>
+  <dd>
+    <description>
+A buffer overflow allowed remote attackers to execute
+arbitrary code by sending a large client master key in SSL2 or a
+large session ID in SSL3.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20020730.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6e (Affected 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+  <dt><b><a name="2002-0655"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2002-0655">CAN-2002-0655</a></a></b>: 30th July 2002<p/></dt>
+  <dd>
+    <description>
+Inproper handling of ASCII representations of integers on
+64 bit platforms allowed remote attackers to cause a denial of
+service or possibly execute arbitrary code.
+    </description>
+    <a href="http://www.openssl.org/news/secadv_20020730.txt">(original advisory)</a>
+  </dd>
+  <p/>
+  <dd>Fixed in OpenSSL  
+      0.9.6e (Affected 0.9.6d, 0.9.6c, 0.9.6b, 0.9.6a, 0.9.6) </dd>
+  <p/>
+</dl>
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
new file mode 100644 (file)
index 0000000..ce48f3f
--- /dev/null
@@ -0,0 +1,338 @@
+<!-- All security issues affecting OpenSSL since the 
+     release of 0.9.6 on 20000924, 0.9.7 on 20021231 -->
+
+<security updated="20050520">
+
+  <issue public="20020730">
+    <cve name="2002-0655"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <fixed base="0.9.6" version="0.9.6e" date="20020730"/>
+    <advisory url="http://www.openssl.org/news/secadv_20020730.txt"/>
+    <reported source="OpenSSL Group (A.L. Digital)"/>
+    <description>
+Inproper handling of ASCII representations of integers on
+64 bit platforms allowed remote attackers to cause a denial of
+service or possibly execute arbitrary code.
+    </description>
+  </issue>
+
+  <issue public="20020730">
+    <cve name="2002-0656"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <fixed base="0.9.6" version="0.9.6e" date="20020730"/>
+    <advisory url="http://www.openssl.org/news/secadv_20020730.txt"/>
+    <reported source="OpenSSL Group (A.L. Digital)"/>
+    <description>
+A buffer overflow allowed remote attackers to execute
+arbitrary code by sending a large client master key in SSL2 or a
+large session ID in SSL3.
+    </description>
+  </issue>
+
+  <issue public="20020730">
+    <cve name="2002-0657"/>
+    <advisory url="http://www.openssl.org/news/secadv_20020730.txt"/>
+    <reported source="OpenSSL Group (A.L. Digital)"/>
+    <description>
+A buffer overflow when Kerberos is enabled allowed attackers
+to execute arbitrary code by sending a long master key.  Note that this
+flaw did not affect any released version of 0.9.6 or 0.9.7
+    </description>
+  </issue>
+
+  <issue public="20020730">
+    <cve name="2002-0659"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <fixed base="0.9.6" version="0.9.6e" date="20020730"/>
+    <description>
+A flaw in the ASN1 library allowed remote attackers to cause a denial of 
+service by sending invalid encodings.
+    </description>
+  </issue>
+
+  <issue>
+    <cve name="2002-1568"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <fixed base="0.9.6" version="0.9.6f" date="20020808"/>
+    <description>
+The use of assertions when detecting buffer overflow attacks
+allowed remote attackers to cause a denial of service (crash) by
+sending certain messages to cause
+OpenSSL to abort from a failed assertion, as demonstrated using SSLv2
+CLIENT_MASTER_KEY messages, which were not properly handled in
+s2_srvr.c.
+    </description>
+  </issue>
+
+  <issue public="20030219">
+    <cve name="2003-0078"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <fixed base="0.9.7" version="0.9.7a" date="20030219"/>
+    <fixed base="0.9.6" version="0.9.6i" date="20030219"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030219.txt"/>
+    <description>
+sl3_get_record in s3_pkt.c did not perform a MAC computation if an
+incorrect block cipher padding was used, causing an information leak
+(timing discrepancy) that may make it easier to launch cryptographic
+attacks that rely on distinguishing between padding and MAC
+verification errors, possibly leading to extraction of the original
+plaintext, aka the "Vaudenay timing attack."
+    </description>
+  </issue>
+
+  <issue public="20030319">
+    <cve name="2003-0131"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <fixed base="0.9.6" version="0.9.6j" date="20030410"/>
+    <fixed base="0.9.7" version="0.9.7b" date="20030410"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030319.txt"/>
+    <description>
+The SSL and TLS components allowed remote attackers to perform an
+unauthorized RSA private key operation via a modified Bleichenbacher
+attack that uses a large number of SSL or TLS connections using PKCS #1 
+v1.5 padding that caused OpenSSL to leak information regarding the
+relationship between ciphertext and the associated plaintext, aka the
+"Klima-Pokorny-Rosa attack"
+    </description>
+  </issue>
+
+  <issue public="20030314">
+    <cve name="2003-0147"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030317.txt"/>
+    <fixed base="0.9.7" version="0.9.7b" date="20030410"/>
+    <fixed base="0.9.6" version="0.9.6j" date="20030410"/>
+    <description>
+RSA blinding was not enabled by default, which could allow local and
+remote attackers to obtain a server's private key by determining
+factors using timing differences on (1) the number of extra reductions
+during Montgomery reduction, and (2) the use of different integer
+multiplication algorithms ("Karatsuba" and normal).
+    </description>
+  </issue>
+
+  <issue public="20030930">
+    <cve name="2003-0543"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.6" version="0.9.6j"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <fixed base="0.9.7" version="0.9.7c" date="20030930"/>
+    <fixed base="0.9.6" version="0.9.6k" date="20030930"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030930.txt"/>
+    <reported source="NISCC"/>
+    <description>
+An integer overflow could allow remote attackers to cause a denial of
+service (crash) via an SSL client certificate with certain ASN.1 tag
+values.
+    </description>
+  </issue>
+
+  <issue public="20030930">
+    <cve name="2003-0544"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.6" version="0.9.6j"/>
+    <fixed base="0.9.6" version="0.9.6k" date="20030930"/>
+    <fixed base="0.9.7" version="0.9.7c" date="20030930"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030930.txt"/>
+    <reported source="NISCC"/>
+    <description>
+Incorrect tracking of the number of characters in certain
+ASN.1 inputs could allow remote attackers to cause a denial of
+service (crash) by sending an SSL client certificate that causes OpenSSL to
+read past the end of a buffer when the long form is used.
+    </description>
+  </issue>
+
+  <issue public="20030930">
+    <cve name="2003-0545"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <fixed base="0.9.7" version="0.9.7c" date="20030930"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030930.txt"/>
+    <reported source="NISCC"/>
+    <description>
+Certain ASN.1 encodings that were rejected as invalid by the parser could
+trigger a bug in the deallocation of the corresponding data structure,
+corrupting the stack, leading to a crash.
+    </description>
+  </issue>
+
+  <issue public="20031104">
+    <cve name="2003-0851"/>
+    <affects base="0.9.6" version="0.9.6k"/>
+    <fixed base="0.9.6" version="0.9.6l" date="20031104"/>
+    <advisory url="http://www.openssl.org/news/secadv_20031104.txt"/>
+    <reported source="Novell"/>
+    <description> 
+A flaw in OpenSSL 0.9.6k (only) would cause certain ASN.1 sequences to
+trigger a large recursion.  On platforms such as Windows this large
+recursion cannot be handled correctly and so the bug causes OpenSSL to
+crash.  A remote attacker could exploit this flaw if they can send
+arbitrary ASN.1 sequences which would cause OpenSSL to crash.  This
+could be performed for example by sending a client certificate to a
+SSL/TLS enabled server which is configured to accept them.
+    </description>
+  </issue>
+
+  <issue public="20040317">
+    <cve name="2004-0079"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.6" version="0.9.6j"/>
+    <affects base="0.9.6" version="0.9.6k"/>
+    <affects base="0.9.6" version="0.9.6l"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <affects base="0.9.7" version="0.9.7c"/>
+    <fixed base="0.9.7" version="0.9.7d" date="20040317"/>
+    <fixed base="0.9.6" version="0.9.6m" date="20040317"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030317.txt"/>
+    <reported source="OpenSSL group"/>
+    <description> 
+The Codenomicon TLS Test Tool uncovered a null-pointer assignment in the
+do_change_cipher_spec() function.  A remote attacker could perform a
+carefully crafted SSL/TLS handshake against a server that used the
+OpenSSL library in such a way as to cause a crash.
+    </description>
+  </issue>
+
+  <issue public="20040317">
+    <cve name="2004-0081"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030317.txt"/>
+    <reported source="OpenSSL group"/>
+    <description>
+The Codenomicon TLS Test Tool found that some unknown message types
+were handled incorrectly, allowing a remote attacker to cause a denial
+of service (infinite loop).
+    </description>
+  </issue>
+
+  <issue public="20040317">
+    <cve name="2004-0112"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <affects base="0.9.7" version="0.9.7c"/>
+    <fixed base="0.9.7" version="0.9.7d" date="20040317"/>
+    <reported source="OpenSSL group (Stephen Henson)"/>
+    <advisory url="http://www.openssl.org/news/secadv_20030317.txt"/>
+    <description>
+A flaw in SSL/TLS handshaking code when using Kerberos ciphersuites.
+A remote attacker could perform a carefully crafted SSL/TLS handshake
+against a server configured to use Kerberos ciphersuites in such a way
+as to cause OpenSSL to crash.  Most applications have no ability to
+use Kerberos ciphersuites and will therefore be unaffected.
+    </description>
+  </issue>
+
+  <issue public="20040930">
+    <cve name="2004-0975"/>
+    <affects base="0.9.7" version="0.9.7"/>
+    <affects base="0.9.7" version="0.9.7a"/>
+    <affects base="0.9.7" version="0.9.7b"/>
+    <affects base="0.9.7" version="0.9.7c"/>
+    <affects base="0.9.7" version="0.9.7d"/>
+    <affects base="0.9.7" version="0.9.7e"/>
+    <affects base="0.9.6" version="0.9.6"/>
+    <affects base="0.9.6" version="0.9.6a"/>
+    <affects base="0.9.6" version="0.9.6b"/>
+    <affects base="0.9.6" version="0.9.6c"/>
+    <affects base="0.9.6" version="0.9.6d"/>
+    <affects base="0.9.6" version="0.9.6e"/>
+    <affects base="0.9.6" version="0.9.6f"/>
+    <affects base="0.9.6" version="0.9.6g"/>
+    <affects base="0.9.6" version="0.9.6h"/>
+    <affects base="0.9.6" version="0.9.6i"/>
+    <affects base="0.9.6" version="0.9.6j"/>
+    <affects base="0.9.6" version="0.9.6k"/>
+    <affects base="0.9.6" version="0.9.6l"/>
+    <affects base="0.9.6" version="0.9.6m"/>
+    <fixed base="0.9.7" version="0.9.7f" date="20050322"/>
+    <fixed base="0.9.6" version="0.9.6-cvs" date="20041114"/>
+    <!-- der_chop was removed 20041114 -->
+
+    <description>
+The der_chop script created temporary files insecurely which could
+allow local users to overwrite files via a symlink attack on temporary
+files.  Note that it is quite unlikely that a user would be using the
+redundant der_chop script, and this script was removed from the OpenSSL
+distribution.
+    </description>
+  </issue>
+</security>
+
diff --git a/news/vulnerabilities.xsl b/news/vulnerabilities.xsl
new file mode 100644 (file)
index 0000000..a988751
--- /dev/null
@@ -0,0 +1,95 @@
+<?xml version="1.0"?>
+<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
+
+  <xsl:output indent="yes" encoding="ISO-8859-1" method="xml" omit-xml-declaration="yes"/>
+
+<xsl:include href="./vulnerabilitiesdates.xsl"/>
+
+<xsl:key name="unique-date" match="@public" use="substring(.,1,4)"/>
+<xsl:key name="unique-base" match="@base" use="."/>
+
+<xsl:template match="security">
+  <xsl:text>## Do not edit this file, instead edit vulnerabilities.xml
+## then create it using
+## xsltproc vulnerabilities.xsl vulnerabilities.xml 
+##
+
+</xsl:text>
+  <xsl:text>#use wml::openssl area=news pages=vulnerabilities
+
+</xsl:text>
+<title>OpenSSL vulnerabilities</title>
+
+<h1>OpenSSL vulnerabilities</h1>
+
+<p>This page lists all security vulnerabilities fixed in released
+versions of OpenSSL since 0.9.6 was released on 24th September 2000.
+</p>
+
+<xsl:for-each select="issue/@public[generate-id()=generate-id(key('unique-date',substring(.,1,4)))]">
+                 <xsl:sort select="." order="descending"/>
+<xsl:variable name="year" select="substring(.,1,4)"/>
+<h2><xsl:value-of select="$year"/></h2>
+             <dl>
+                <xsl:apply-templates select="../../issue[substring(@public,1,4)=$year]">
+                  <xsl:sort select="cve/@name" order="descending"/>
+               </xsl:apply-templates>
+             </dl>
+        </xsl:for-each>
+</xsl:template>
+
+<xsl:template match="issue">
+  <dt>
+  <b><a name="{cve/@name}">
+  <xsl:apply-templates select="cve"/>
+</a></b>
+<xsl:text>: </xsl:text><xsl:call-template name="dateformat">
+  <xsl:with-param name="date" select="@public"/>
+</xsl:call-template>
+<p/>
+</dt><dd>
+  <xsl:copy-of select="description"/>
+  <xsl:if test="advisory/@url">
+    <a href="{advisory/@url}">(original advisory)</a>
+        </xsl:if>
+  </dd>
+  <p/>
+    <xsl:for-each select="fixed">
+      <dd>Fixed in OpenSSL  
+      <xsl:value-of select="@version"/>
+      <xsl:variable name="mybase" select="@base"/>
+      <xsl:for-each select="../affects[@base=$mybase]|../maybeaffects[@base=$mybase]">
+        <xsl:sort select="@version" order="descending"/>
+            <xsl:if test="position() =1">
+              <xsl:text> (Affected </xsl:text>
+            </xsl:if>
+            <xsl:value-of select="@version"/>
+            <xsl:if test="name() = 'maybeaffects'">
+              <xsl:text>?</xsl:text>
+            </xsl:if>
+            <xsl:if test="position() != last()">
+              <xsl:text>, </xsl:text>
+            </xsl:if>
+            <xsl:if test="position() = last()">
+              <xsl:text>) </xsl:text>
+            </xsl:if>
+      </xsl:for-each>
+      </dd>
+    </xsl:for-each>
+  <p/>
+</xsl:template>
+
+<xsl:template match="cve">
+<xsl:if test="@description = 'full'">
+The Common Vulnerabilities and Exposures project
+has assigned the name 
+</xsl:if>
+<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name={@name}">CAN-<xsl:value-of select="@name"/></a>
+<xsl:if test="@description = 'full'">
+ to this issue.
+</xsl:if>
+</xsl:template>
+
+</xsl:stylesheet>
+
+
diff --git a/news/vulnerabilitiesdates.xsl b/news/vulnerabilitiesdates.xsl
new file mode 100644 (file)
index 0000000..8d47f98
--- /dev/null
@@ -0,0 +1,54 @@
+<?xml version="1.0"?>
+<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
+
+<xsl:template name="dateformat">
+
+  <xsl:param name="date" select="."/>
+
+  <xsl:variable name="day" select="number(substring($date,7,2))"/>
+  <xsl:variable name="month" select="number(substring($date,5,2))"/>
+  <xsl:variable name="year" select="number(substring($date,1,4))"/>
+  
+  <xsl:if test="$day &gt; 0"> 
+  <xsl:value-of select="$day" />
+  
+    <xsl:choose>
+      <xsl:when test="$day=1 or $day=21 or $day=31">st</xsl:when>
+      <xsl:when test="$day=2 or $day=22">nd</xsl:when>
+      <xsl:when test="$day=3 or $day=23">rd</xsl:when>
+      <xsl:otherwise>th</xsl:otherwise>
+    </xsl:choose>
+    
+    <xsl:text>&#160;</xsl:text>
+  </xsl:if>
+
+  <xsl:call-template name="whatmonth">
+  <xsl:with-param name="month" select="$month"/>
+  </xsl:call-template>
+  
+  <xsl:if test="$year&gt;0">
+    <xsl:text>&#160;</xsl:text>
+    <xsl:value-of select="$year"/>
+    </xsl:if>
+    
+</xsl:template>
+
+<xsl:template name="whatmonth">
+<xsl:param name="month" select="."/>
+  <xsl:choose>
+    <xsl:when test="$month=01">January</xsl:when>
+    <xsl:when test="$month=02">February</xsl:when>
+    <xsl:when test="$month=03">March</xsl:when>
+    <xsl:when test="$month=04">April</xsl:when>
+    <xsl:when test="$month=05">May</xsl:when>
+    <xsl:when test="$month=06">June</xsl:when>
+    <xsl:when test="$month=07">July</xsl:when>
+    <xsl:when test="$month=08">August</xsl:when>
+    <xsl:when test="$month=09">September</xsl:when>
+    <xsl:when test="$month=10">October</xsl:when>
+    <xsl:when test="$month=11">November</xsl:when>
+    <xsl:when test="$month=12">December</xsl:when>
+  </xsl:choose>
+</xsl:template>
+
+</xsl:stylesheet>